10 Ways Your Phone System Improves Your Customers’ Experience

Business competition in today’s economy is fierce. Your customers expect the highest level of care, and you and your staff need to be reachable, professional and customer-focused at all times – no matter where you’re working. If that’s your business model, is your phone system supporting you and your employees like you need to support your customers? Use this checklist to evaluate if your business communications gives your customers the experience they expect from their [...]

By | February 3rd, 2017
Industry InSights, IT Infrastructure|Comments Off on 10 Ways Your Phone System Improves Your Customers’ Experience

Keeping An Eye Out for Cyber Threats

You don't have to be an ace to ensure the protection of your business, employees and clients; however cybersecurity is so vital it should be at the forefront of all your practices. Awareness starts by being able to identify potential threats as way to decrease attacks and data breaches. From the many online threats, the most common are Spam, Phishing, Virus and Spyware. Spam, or unsolicited junk emails, does more than take up space in [...]

By | October 2nd, 2015
IT Infrastructure|Comments Off on Keeping An Eye Out for Cyber Threats

What Everybody Needs to Know About Malvertising

More people are falling prey to drive-by attacks when visiting websites. The following lesson learned from a recent incident with the Yahoo search engine emphasizes the fact that you’re really on your own when it comes to Internet security, and you need to know how to protect yourself. Last month Yahoo! was subjected to malvertising, or malicious advertising. After a weeklong attack, the Company announced it had successfully removed the malware. Malvertising attacks use online adverts to spread malware [...]

By | September 18th, 2015
IT Infrastructure|Comments Off on What Everybody Needs to Know About Malvertising

InfoSight has been re-issued SSAE 16 Type II

With all the cyber threats today, organizations need to be assured that they’re working with reputable vendors who operate in a secure manner and maintain protected systems. One way to provide this assurance is to apply for SSAE 16 examination. InfoSight Inc. is proud to announce the successful completion of a Statements on Standards for Attestation Engagements No.16 (SSAE 16) Type II examination, formally known as a Report on Controls at a Service Organization (SOC [...]

By | August 5th, 2015
Compliance & Business Continuity, IT Infrastructure|Comments Off on InfoSight has been re-issued SSAE 16 Type II

An Introduction: Pharming Attacks

By: Ahmed Mohamed Internet usage is growing dramatically, but the vast majority of Internet users don’t have security backgrounds. Nor do a large majority of companies care about information security and the possible severity of any attack that could harm valuable company assets. They don’t give their employees security awareness sessions, either. For these reasons, humans are the weakest link in the information security chain. On the other hand, most information security pen-testers focus only [...]

By | August 19th, 2013
IT Infrastructure, Security Awareness|Comments Off on An Introduction: Pharming Attacks

How Many Vulnerabilities Does Your POS System Have? [Infographic]

The potential for damaging data breaches lurks in nearly every corner for SMBs. By Ricky Ribeiro "Too many small and medium-sized businesses overlook the potential IT security booby-traps that exist in their physical and virtual environments. By ignoring these security loopholes, businesses risk suffering devastating malware disasters. Exactly how big is the SMB security issue? According to estimates by Visa, 95% of the data breaches in 2011 were from its small business customers. A new [...]

By | May 22nd, 2013
IT Infrastructure|Comments Off on How Many Vulnerabilities Does Your POS System Have? [Infographic]

Are Your Smartphone Apps Leaking Personal Information In Clear Text?

Are Your Smartphone Apps Leaking Personal Information? For many years now, we have been trained to look for the SSL icon on our browsers, and have told our family and friends to do the same. It’s a basic security measure that ensures our traffic cannot be intercepted and spied on. The last thing we want when doing online banking, reading our email or shopping online is having someone sitting there and watching our every move, [...]

By | March 13th, 2013
Industry InSights, IT Infrastructure|Comments Off on Are Your Smartphone Apps Leaking Personal Information In Clear Text?

Five Steps to Take When Your Twitter Account Has Been Hacked

If your Twitter account is sending tweets and/or direct messages that you haven't actually sent, your Twitter account has been hacked. Some of the messages may look like this: Hey someone is spreading nasty rumors about you: <link added> LOL! I’m laughing so hard at this pic of you:  <link added> Did you see this funny tweet about you? <link added> Watches on Sale! $99 <link added> Lose weight fast! <link added> If your Twitter [...]

By | November 20th, 2012
IT Infrastructure, Social Media|Comments Off on Five Steps to Take When Your Twitter Account Has Been Hacked

Malware, Viruses, Trojans, OH MY!

Malware. What is it and why should I care? Two years ago, there were nearly 3 million unique forms of malicious code, and thousands of new ones are discovered daily. The risk of being infected is greater than ever because every single possible data communication method can be used to transmit malware. And we know this is true because we so often see it in the news. But what exactly is malware? Malware = MALicious [...]

By | August 10th, 2012
IT Infrastructure|Comments Off on Malware, Viruses, Trojans, OH MY!

Tips for Securing Mobile Devices in the Enterprise

As smartphone and tablet sales continue to increase, more employees are bringing their personal mobile devices into the corporate environment. Allowing these devices to connect to your network enterprise without any guidelines can pose a serious risk. Securing mobile devices is one of the biggest challenges facing IT security professionals as cyber criminals turn their attention to this platform. Research firm IDC says global spending on mobile security is on track to balloon to $1.9 [...]

By | October 17th, 2011
Industry InSights, IT Infrastructure, Network Security & Solutions|Comments Off on Tips for Securing Mobile Devices in the Enterprise